Click here to download all references as Bib-File.•
2023-05-15
⋅
embeeresearch
⋅
Quasar Rat Analysis - Identification of 64 Quasar Servers Using Shodan and Censys Quasar RAT |
2023-05-08
⋅
Blackberry
⋅
SideWinder Uses Server-side Polymorphism to Attack Pakistan Government Officials — and Is Now Targeting Turkey |
2023-05-07
⋅
Twitter (@embee_research)
⋅
AgentTesla - Full Loader Analysis - Resolving API Hashes Using Conditional Breakpoints Agent Tesla |
2023-05-04
⋅
Check Point Research
⋅
Eastern Asian Android Assault - FluHorse FluHorse |
2023-05-01
⋅
Check Point Research
⋅
Chain Reaction: RokRAT's Missing Link Amadey RokRAT |
2023-04-26
⋅
Uptycs
⋅
RTM Locker Ransomware as a Service (RaaS) Now Suits Up for Linux Architecture RTM Locker |
2023-04-26
⋅
ESET Research
⋅
Evasive Panda APT group delivers malware via updates for popular Chinese software MgBot BRONZE HIGHLAND |
2023-04-26
⋅
eSentire
⋅
Gootloader Unloaded: Researchers Launch Multi-Pronged Offensive Against Gootloader, Cutting Off Traffic to Thousands of Gootloader Web Pages and Using the Operator’s Very Own Tactics to Protect End-Users GootLoader |
2023-04-20
⋅
ESET Research
⋅
Linux malware strengthens links between Lazarus and the 3CX supply‑chain attack BADCALL SimpleTea POOLRAT 3CX Backdoor BADCALL IconicStealer |
2023-04-20
⋅
Secureworks
⋅
Bumblebee Malware Distributed Via Trojanized Installer Downloads BumbleBee Cobalt Strike |
2023-04-19
⋅
Team Cymru
⋅
AllaKore(d) the SideCopy Train AllaKore |
2023-04-18
⋅
Check Point Research
⋅
Raspberry Robin: Anti-Evasion How-To & Exploit Analysis Raspberry Robin |
2023-04-10
⋅
Twitter (@embee_research)
⋅
Redline Stealer - Static Analysis and C2 Extraction Amadey RedLine Stealer |
2023-04-08
⋅
Twitter (@embee_research)
⋅
Dcrat - Manual De-obfuscation of .NET Malware DCRat |
2023-04-04
⋅
Team Cymru
⋅
A Blog with NoName Dosia |
2023-04-04
⋅
Check Point Research
⋅
Rorschach – A New Sophisticated and Fast Ransomware Rorschach Ransomware |
2023-03-31
⋅
Blackberry
⋅
Initial Implants and Network Analysis Suggest the 3CX Supply Chain Operation Goes Back to Fall 2022 3CX Backdoor |
2023-03-31
⋅
splunk
⋅
Splunk Insights: Investigating the 3CXDesktopApp Supply Chain Compromise 3CX Backdoor |
2023-03-30
⋅
Trend Micro
⋅
Developing Story: Information on Attacks Involving 3CX Desktop App 3CX Backdoor IconicStealer |
2023-03-29
⋅
CrowdStrike
⋅
CrowdStrike Falcon Platform Detects and Prevents Active Intrusion Campaign Targeting 3CXDesktopApp Customers 3CX Backdoor |